CN106533656A - Key multilayer mixed encryption/decryption method based on WSN - Google Patents

Key multilayer mixed encryption/decryption method based on WSN Download PDF

Info

Publication number
CN106533656A
CN106533656A CN201611031173.5A CN201611031173A CN106533656A CN 106533656 A CN106533656 A CN 106533656A CN 201611031173 A CN201611031173 A CN 201611031173A CN 106533656 A CN106533656 A CN 106533656A
Authority
CN
China
Prior art keywords
plaintext
data
key
sequence
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611031173.5A
Other languages
Chinese (zh)
Other versions
CN106533656B (en
Inventor
林盛鑫
刘华珠
赵晓芳
陈雪芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongguan University of Technology
Original Assignee
Dongguan University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan University of Technology filed Critical Dongguan University of Technology
Priority to CN201611031173.5A priority Critical patent/CN106533656B/en
Publication of CN106533656A publication Critical patent/CN106533656A/en
Application granted granted Critical
Publication of CN106533656B publication Critical patent/CN106533656B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Abstract

The invention discloses a key multilayer mixed encryption/decryption method based on a WSN. The method comprises the following steps: a plaintext data multilayer mixed encryption and transmitting step of subjecting plaintext data required to be transmitted in the WSN to multilayer mixed encryption by using plaintext random separation technology, digital envelope technology and digital signature technology and then transmitted the encrypted plaintext data; a ciphertext data decryption and receiving step of decrypting the ciphertext data received in the WSN by using the plaintext random separation technology, the digital envelope technology and the digital signature technology to complete data reception. The method separates the plaintext by using a binary pseudorandom sequence, encrypts the data by using the digital envelope technology and the digital signature technology, and effectively combines the plaintext separation, symmetric encryption and public key encryption and digital signature, thereby greatly improving the efficiency and security of data transmission.

Description

A kind of key multilamellar mixing method for encryption/decryption based on WSN
Technical field
A kind of a kind of the present invention relates to network method for encryption/decryption, more particularly to mixing of key multilamellar plus/solution based on WSN Decryption method.
Background technology
At present, with the fast development of technology of Internet of things and computer technology, nowadays wireless sensor network (Wireless Sensor Network, WSN) have been widely used for the intellectualities such as smart home, agricultural, commercial and industrial, automatic field. As the Node distribution of wireless sensor network is in complex environment, environment of the most sensor node in opening, The threat of network security is faced with, the data transmitted in atmosphere are easily stolen by attacker, is likely to result in personal information, business Industry is secret, property loss even personal safety etc. is threatened, and has severely impacted the development and application of WSN.
WSN is a kind of new network, but its sensor network nodes computing capability is low, memory space is little, and provides energy The battery capacity of amount is extremely limited, and its feature and itself restriction cause it to exist in security algorithm research with conventional wireless network Many differences.The security algorithm in traditional cordless communication network, computer network is imitated, the safe practice of WSN is entered Row further investigation, it is proposed that the lightweight solutions of feasibility, is significant.It is an object of the invention to propose one kind Key multilamellar mixing method for encryption/decryption based on WSN, to improve network safety among the nodes.
The content of the invention
For overcoming the problem of the deficiencies in the prior art and presence, the present invention to provide a kind of key multilamellar based on WSN and mix Method for encryption/decryption, the method are separated to clear data using binary pseudo-random sequence, then using Digital Envelope Technology with Digital signature technology carries out data is activation after being encrypted to data again, plaintext is separated by which, symmetric cryptography and public key encryption with Various encryption systems such as digital signature are effectively merged, and effectively increase Information Security.
The present invention is achieved by the following technical solutions:A kind of key multilamellar mixing method for encryption/decryption based on WSN, Wherein, the WSN networks are preferably based on the WSN networks that the wireless senser of ZIGBEE technology builds, and methods described includes:
Clear data multilamellar Hybrid Encryption forwarding step:Using random isolation technics, Digital Envelope Technology and number in plain text Word signature technology is transmitted after carrying out multilamellar Hybrid Encryption again to needing the clear data for sending in WSN networks;
Ciphertext data deciphering receiving step:To the ciphertext data for receiving in WSN networks, skill is separated using random in plain text Art, Digital Envelope Technology and digital signature technology are decrypted, to complete the reception of data.
Wherein, the clear data multilamellar Hybrid Encryption forwarding step is specifically included:
S11, the generation binary random sequences consistent with clear data length;
S12, using the binary random sequences and one-dimensional index sequence synthesis two-dimensional sequence;
S13, plaintext separation is carried out to clear data by the two-dimensional sequence, clear data is divided into into the first plaintext and Two in plain text;
S14, originating party public key and originating party private key are generated by ECC, and obtain public key disclosed in debit;
S15, HASH function operations are carried out to the first plaintext, form eap-message digest, carry out digital label in conjunction with originating party private key Name, forms signaling block;
S16, carry out AES encryption respectively to the first plaintext and second plaintext, form ciphertext blocks;
S17, AES key and debit's public key are carried out ECC encryptions, form key block;
S18, ECC encryptions, formation sequence ciphertext blocks are carried out by debit's public key to the two-dimensional sequence;
S19, with reference to the signaling block, ciphertext blocks, key block and sequence ciphertext blocks, formed and send ciphertext, complete data Send.
The ciphertext data deciphering receiving step is specifically included:
S21, the ciphertext data for receiving are divided into into signaling block, key block, ciphertext blocks and sequence ciphertext blocks;
S22, using originating party public key, carry out authentication to signaling block, and obtain the eap-message digest in originating party digital signature;
S23, ECC decryption is carried out using sending and receiving side's private key to key block, obtain AES key;
Ciphertext blocks are carried out AES decryption by S24, the AES key for utilizing acquisition, obtain first in plain text and second plaintext;
S25, the first plaintext obtained to step S24 carry out HASH function operations, form eap-message digest;
S26, the eap-message digest that the eap-message digest obtained in step S22 and step S25 are formed is contrasted, if two message The identical then certification success of summary, into step S27, otherwise authentification failure, and return to step S21 is decrypted again;
S27, using debit's private key sequence ciphertext blocks are carried out with ECC decryption, obtain two-dimensional sequence;
S28, according to two-dimensional sequence to first in plain text and second plaintext B carries out data recombination, obtain clear data, complete number According to reception.
Preferably, in step S11, the binary system stochastic ordering is generated using binary pseudo-random sequence maker Row.
Preferably, in step S13 when carrying out separating to clear data in plain text the two-dimensional sequence, by stochastic ordering Plaintext on row corresponding to all positions of " 1 " as first in plain text, by random sequences corresponding to all positions of " 0 " Plaintext as second plaintext.
The key multilamellar mixing method for encryption/decryption based on WSN that the present invention is provided, which is directed to great deal of nodes in WSN networks Between data transfer present in network security problem, by using binary pseudo-random sequence to plaintext separate, then Data are encrypted with digital signature technology using Digital Envelope Technology, plaintext is separated, symmetric cryptography and public key encryption with Various encryption systems such as digital signature are effectively merged, and greatly improve high efficiency and the safety of data transfer.
Description of the drawings
Fig. 1 is the schematic flow sheet that the Hybrid Encryption of clear data multilamellar described in the embodiment of the present invention sends.
Fig. 2 is the schematic flow sheet that the ciphertext data deciphering is received described in the embodiment of the present invention.
Specific embodiment
For the ease of the understanding of those skilled in the art, further is made to the present invention below in conjunction with the drawings and specific embodiments Describe in detail.
A kind of key multilamellar mixing method for encryption/decryption based on WSN, methods described include:
Clear data multilamellar Hybrid Encryption forwarding step:Using random isolation technics, Digital Envelope Technology and number in plain text Word signature technology is transmitted after carrying out multilamellar Hybrid Encryption again to needing the clear data for sending in WSN networks;Ciphertext data Decryption receiving step:To the ciphertext data for receiving in WSN networks, using random isolation technics, Digital Envelope Technology in plain text It is decrypted with digital signature technology, to complete the reception of data.
Wherein, using when random isolation technics carry out separating to clear data in plain text in plain text, utilize and clear data length The two-dimensional sequence conduct of the one-dimensional index sequence synthesis in identical binary pseudo-random sequence and responsible record data home position Detached foundation in plain text.As the randomness of the two-dimensional sequence is good, the safety of data message can be effectively increased.Numeral is signed The effect of name technology is, by the summary info private key encryption of sender's (originating party), to send recipient to and (receive together with former data Side).Recipient only could decrypt encrypted summary info with the public key of sender, the original for then being received with HASH function pairs Data produce a summary info, then the summary info contrast with decryption.If two summary infos are identical, the letter for receiving is illustrated Breath is complete, is not changed in transmitting procedure, and otherwise descriptive information is modified, therefore, in data transmission procedure, The integrity of information transfer is able to verify that using digital signature technology.Digital Envelope Technology is ensureing by double layer encryption algorithm The safety of information, the symmetric encryption scheme (AES encryption) which utilizes encryption efficiency higher are encrypted to clear data, and are made Operation is encrypted to AES key with beneficial to the public key cryptography scheme (ECC encryptions) for managing and distributing key, therefore, using number Word envelope technology can effectively ensure that the safety of data is activation.
Hereinafter the method that the present invention is provided is described in further detail:
As shown in Figure 1, the clear data multilamellar Hybrid Encryption forwarding step is specifically included:
S11, the generation binary random sequences consistent with clear data length;In the present embodiment, preferably by binary system Pseudo random sequence generator generates the binary random sequences;
S12, using the binary random sequences and one-dimensional index sequence synthesis two-dimensional sequence;
S13, plaintext separation is carried out to clear data by the two-dimensional sequence, clear data is divided into into the first plaintext and Two in plain text;In the present embodiment, when carrying out separating to clear data in plain text the two-dimensional sequence, will be " 1 " in random sequences All positions corresponding to plaintext as first in plain text, the plaintext in random sequences corresponding to all positions of " 0 " is made For second plaintext;
S14, originating party public key and originating party private key are generated by ECC, and obtain public key disclosed in debit;
S15, HASH function operations are carried out to the first plaintext, form eap-message digest, carry out digital label in conjunction with originating party private key Name, forms signaling block;
S16, carry out AES encryption respectively to the first plaintext and second plaintext, form ciphertext blocks;
S17, AES key and debit's public key are carried out ECC encryptions, form key block;
S18, ECC encryptions, formation sequence ciphertext blocks are carried out by debit's public key to the two-dimensional sequence;
S19, with reference to the signaling block, ciphertext blocks, key block and sequence ciphertext blocks, formed and send ciphertext, complete data Send.
Wherein, the binary pseudo-random sequence maker is preferably linear congruence random sequence generator (Linear Congruential Generator, LCG).The formula of the random sequences of the linear congruence random sequence generator is xi= (Axi-1+ C) mod (M), wherein, M is mould (M>0), A is coefficient (0<A<), M C is increment (0<=C<M),x0For initial value (0< =x0<M).Due to parameter C, M, A directly affect the quality of pseudo random number generation, it is contemplated that the efficiency of WSN point sections, this " Lewis-Goosman-Miller " minimum sandards is adopted in embodiment:Take A=16807, C=0 and M=231- 1, it is produced Cycle can reach maximum.Using linear congruence random sequence generator, a kind of binary system stochastic ordering of good performance can be produced Row, so that effectively improve the safety of data message.
As shown in Figure 2, the ciphertext data deciphering receiving step is specifically included:
S21, the ciphertext data for receiving are divided into into signaling block, key block, ciphertext blocks and sequence ciphertext blocks;
S22, using originating party public key, carry out authentication to signaling block, and obtain the eap-message digest in originating party digital signature;
S23, ECC decryption is carried out using sending and receiving side's private key to key block, obtain AES key;
Ciphertext blocks are carried out AES decryption by S24, the AES key for utilizing acquisition, obtain first in plain text and second plaintext;
S25, the first plaintext obtained to step S24 carry out HASH function operations, form eap-message digest;
S26, the eap-message digest that the eap-message digest obtained in step S22 and step S25 are formed is contrasted, if two message The identical then certification success of summary, into step S27, otherwise authentification failure, and return to step S21 is decrypted again;
S27, using debit's private key sequence ciphertext blocks are carried out with ECC decryption, obtain two-dimensional sequence;
S28, according to two-dimensional sequence to first in plain text and second plaintext B carries out data recombination, obtain clear data, complete number According to reception.
Key multilamellar mixing method for encryption/decryption based on WSN provided in an embodiment of the present invention, which passes through pseudo- using binary system Random sequences are separated to plaintext, then data are encrypted with digital signature technology using Digital Envelope Technology, will in plain text Separate, various encryption systems such as symmetric cryptography and public key encryption and digital signature are effectively merged, both effectively increased The high efficiency of data transfer, so as to effective reducing energy consumption, greatly improve the safety of data transfer again, uses so as to effective guarantee The data information security at family, and effectively facilitate the development and application of WSN networks.
Above-described embodiment is the preferably implementation of the present invention, is not limited to the present invention, without departing from this On the premise of bright inventive concept, any obvious replacement is within protection scope of the present invention.

Claims (7)

1. a kind of key multilamellar based on WSN mixes method for encryption/decryption, it is characterised in that methods described includes:
Clear data multilamellar Hybrid Encryption forwarding step:Using random isolation technics in plain text, Digital Envelope Technology and numeral label Name technology is transmitted after carrying out multilamellar Hybrid Encryption again to needing the clear data for sending in WSN networks;
Ciphertext data deciphering receiving step:To the ciphertext data for receiving in WSN networks, using random isolation technics in plain text, Digital Envelope Technology and digital signature technology are decrypted, to complete the reception of data.
2. encryption method according to claim 1, it is characterised in that:The clear data multilamellar Hybrid Encryption forwarding step Specifically include:
S11, the generation binary random sequences consistent with clear data length;
S12, using the binary random sequences and one-dimensional index sequence synthesis two-dimensional sequence;
S13, plaintext separation is carried out to clear data by the two-dimensional sequence, clear data is divided into into the first plaintext bright with second Text;
S14, originating party public key and originating party private key are generated by ECC, and obtain public key disclosed in debit;
S15, HASH function operations are carried out to the first plaintext, form eap-message digest, be digitally signed in conjunction with originating party private key, shape Into signaling block;
S16, carry out AES encryption respectively to the first plaintext and second plaintext, form ciphertext blocks;
S17, AES key and debit's public key are carried out ECC encryptions, form key block;
S18, ECC encryptions, formation sequence ciphertext blocks are carried out by debit's public key to the two-dimensional sequence;
S19, with reference to the signaling block, ciphertext blocks, key block and sequence ciphertext blocks, formed and send ciphertext, complete data is activation.
3. method according to claim 2, it is characterised in that:The ciphertext data deciphering receiving step is specifically included:
S21, the ciphertext data for receiving are divided into into signaling block, key block, ciphertext blocks and sequence ciphertext blocks;
S22, using originating party public key, carry out authentication to signaling block, and obtain the eap-message digest in originating party digital signature;
S23, ECC decryption is carried out using sending and receiving side's private key to key block, obtain AES key;
Ciphertext blocks are carried out AES decryption by S24, the AES key for utilizing acquisition, obtain first in plain text and second plaintext;
S25, the first plaintext obtained to step S24 carry out HASH function operations, form eap-message digest;
S26, the eap-message digest that the eap-message digest obtained in step S22 and step S25 are formed is contrasted, if two eap-message digests Identical then certification success, into step S27, otherwise authentification failure, and return to step S21 is decrypted again;
S27, using debit's private key sequence ciphertext blocks are carried out with ECC decryption, obtain two-dimensional sequence;
S28, according to two-dimensional sequence to first in plain text and second plaintext B carries out data recombination, obtain clear data, complete data and connect Receive.
4. method according to claim 2, it is characterised in that:In step S11, given birth to using binary pseudo-random sequence Grow up to be a useful person and generate the binary random sequences.
5. method according to claim 4, it is characterised in that:The binary pseudo-random sequence maker is linear congruence Random sequence generator.
6. method according to claim 2, it is characterised in that:In step S13 by the two-dimensional sequence in plain text When data carry out separating in plain text, using the plaintext in random sequences corresponding to all positions of " 1 " as the first plaintext, will be random Plaintext in sequence corresponding to all positions of " 0 " is used as second plaintext.
7. the method according to any one in claim 1~6, it is characterised in that:The WSN networks are based on ZIGBEE The WSN networks that the wireless senser of technology builds.
CN201611031173.5A 2016-11-18 2016-11-18 A kind of key multilayer mixing method for encryption/decryption based on WSN Active CN106533656B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611031173.5A CN106533656B (en) 2016-11-18 2016-11-18 A kind of key multilayer mixing method for encryption/decryption based on WSN

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611031173.5A CN106533656B (en) 2016-11-18 2016-11-18 A kind of key multilayer mixing method for encryption/decryption based on WSN

Publications (2)

Publication Number Publication Date
CN106533656A true CN106533656A (en) 2017-03-22
CN106533656B CN106533656B (en) 2019-08-23

Family

ID=58356100

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611031173.5A Active CN106533656B (en) 2016-11-18 2016-11-18 A kind of key multilayer mixing method for encryption/decryption based on WSN

Country Status (1)

Country Link
CN (1) CN106533656B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107181739A (en) * 2017-04-28 2017-09-19 深圳市航天无线通信技术有限公司 Data safety exchange method and device
CN107396351A (en) * 2017-08-24 2017-11-24 四川长虹电器股份有限公司 A kind of encipher-decipher method for strengthening zigbee network safety
CN107466478A (en) * 2017-06-06 2017-12-12 香港应用科技研究院有限公司 Between the Optimization deployment and BLE equipment of BLE networks the effect of data exchange and safety management
CN108833343A (en) * 2018-04-28 2018-11-16 南京搜文信息技术有限公司 A kind of parallel encryption method that supporting big data and decryption method
CN109873700A (en) * 2019-01-16 2019-06-11 平安普惠企业管理有限公司 Key generation method, device, computer readable storage medium and terminal device
CN110086818A (en) * 2019-05-05 2019-08-02 绍兴文理学院 A kind of cloud file security storage system and access control method
CN112601111A (en) * 2020-11-19 2021-04-02 西安诺瓦星云科技股份有限公司 Data processing method and device and data transmission system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223228A (en) * 2011-05-11 2011-10-19 北京航空航天大学 Method for designing AES (Advanced Encryption Standard) encryption chip based on FPGA (Field Programmable Gate Array) and embedded encryption system
CN103414842A (en) * 2013-08-02 2013-11-27 广州杰赛科技股份有限公司 Image data encryption method and system and image data decryption method and system
JP2015069192A (en) * 2013-10-01 2015-04-13 富士電機株式会社 Information processing device, and encryption method
US9020146B1 (en) * 2007-09-18 2015-04-28 Rockwell Collins, Inc. Algorithm agile programmable cryptographic processor
CN104735652A (en) * 2015-03-30 2015-06-24 东北大学 Chaotic encryption method suitable for wireless sensor network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9020146B1 (en) * 2007-09-18 2015-04-28 Rockwell Collins, Inc. Algorithm agile programmable cryptographic processor
CN102223228A (en) * 2011-05-11 2011-10-19 北京航空航天大学 Method for designing AES (Advanced Encryption Standard) encryption chip based on FPGA (Field Programmable Gate Array) and embedded encryption system
CN103414842A (en) * 2013-08-02 2013-11-27 广州杰赛科技股份有限公司 Image data encryption method and system and image data decryption method and system
JP2015069192A (en) * 2013-10-01 2015-04-13 富士電機株式会社 Information processing device, and encryption method
CN104735652A (en) * 2015-03-30 2015-06-24 东北大学 Chaotic encryption method suitable for wireless sensor network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王亮: "基于WSN的ECC与AES混合加密算法研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107181739A (en) * 2017-04-28 2017-09-19 深圳市航天无线通信技术有限公司 Data safety exchange method and device
CN107181739B (en) * 2017-04-28 2021-02-26 深圳市航天无线通信技术有限公司 Data security interaction method and device
CN107466478A (en) * 2017-06-06 2017-12-12 香港应用科技研究院有限公司 Between the Optimization deployment and BLE equipment of BLE networks the effect of data exchange and safety management
CN107466478B (en) * 2017-06-06 2020-09-29 香港应用科技研究院有限公司 Method and system for data exchange between Bluetooth low-power-consumption devices
CN107396351A (en) * 2017-08-24 2017-11-24 四川长虹电器股份有限公司 A kind of encipher-decipher method for strengthening zigbee network safety
CN108833343A (en) * 2018-04-28 2018-11-16 南京搜文信息技术有限公司 A kind of parallel encryption method that supporting big data and decryption method
CN109873700A (en) * 2019-01-16 2019-06-11 平安普惠企业管理有限公司 Key generation method, device, computer readable storage medium and terminal device
CN109873700B (en) * 2019-01-16 2023-10-10 内蒙古惠强科技有限公司 Key generation method, device, computer readable storage medium and terminal equipment
CN110086818A (en) * 2019-05-05 2019-08-02 绍兴文理学院 A kind of cloud file security storage system and access control method
CN112601111A (en) * 2020-11-19 2021-04-02 西安诺瓦星云科技股份有限公司 Data processing method and device and data transmission system
CN112601111B (en) * 2020-11-19 2023-03-14 西安诺瓦星云科技股份有限公司 Data processing method and device and data transmission system

Also Published As

Publication number Publication date
CN106533656B (en) 2019-08-23

Similar Documents

Publication Publication Date Title
CN106533656B (en) A kind of key multilayer mixing method for encryption/decryption based on WSN
CN105743646B (en) A kind of Identity based encryption method and system
CN103684794B (en) A kind of communication data encipher-decipher method based on the AES of DES, RSA, SHA 1
US9172529B2 (en) Hybrid encryption schemes
Xin A mixed encryption algorithm used in internet of things security transmission system
CN101977112B (en) Public key cipher encrypting and decrypting method based on neural network chaotic attractor
CN103731270B (en) Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm
CN103618610A (en) Information safety algorithm based on energy information gateway in smart power grid
CN101262341A (en) A mixed encryption method in session system
CN102025505A (en) Advanced encryption standard (AES) algorithm-based encryption/decryption method and device
CN102333093A (en) Data encryption transmission method and system
CN109951453A (en) A kind of safe encryption method based on block chain
CN102065016A (en) Message sending and receiving method and device, message processing method and system
CN106685969A (en) Hybrid-encrypted information transmission method and transmission system
CN103297230B (en) Information encipher-decipher method, Apparatus and system
CN100594691C (en) Data transmission encryption method of MANET network
CN104836657A (en) Identity anonymity-based broadcast encryption method having efficient decryption characteristic
CN112055022A (en) High-efficiency and high-security network file transmission double encryption method
CN104200154A (en) Identity based installation package signing method and identity based installation package signing device
CN111049738B (en) E-mail data security protection method based on hybrid encryption
CN103167494A (en) Information sending method and information sending system
CN101882996B (en) Information encryption and decryption method in distributed system based on identity
CN101984626B (en) Method and system for safely exchanging files
CN103023646A (en) Signcryption method capable of gathering signcryption texts
CN101964039B (en) Encryption protection method and system of copyright object

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20170322

Assignee: Dongguan Spider IoT Technology Co.,Ltd.

Assignor: DONGGUAN University OF TECHNOLOGY

Contract record no.: X2022980026002

Denomination of invention: A WSN Based Key Multilayer Hybrid Encryption/Decryption Method

Granted publication date: 20190823

License type: Common License

Record date: 20221213

Application publication date: 20170322

Assignee: Guangdong Hansheng Information Technology Co.,Ltd.

Assignor: DONGGUAN University OF TECHNOLOGY

Contract record no.: X2022440000320

Denomination of invention: A WSN Based Key Multilayer Hybrid Encryption/Decryption Method

Granted publication date: 20190823

License type: Common License

Record date: 20221214

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20170322

Assignee: Yangjiang taiyijiehua Technology Co.,Ltd.

Assignor: DONGGUAN University OF TECHNOLOGY

Contract record no.: X2023990000090

Denomination of invention: A Multi-layer Hybrid Encryption/Decryption Method of Key Based on WSN

Granted publication date: 20190823

License type: Common License

Record date: 20230112